Superuser functionality biometric technology

Due to the explosive growth of cybercrime, the need for higher levels of security will increase enormously in the coming years, especially biometric security solutions based on vein pattern recognition.* Ironically, their implementation may actually create new security problems. For Recogtech, this is reason to release the superuser functionality of its biometric security solutions. In other words, the customer alone has access to this functionality or can grant access to third parties.

Many security products today are IP-based. This often forces IT managers to make adjustments to their network architecture to make security products work properly. They also allow non-company processes onto the network without being able to control them. Many security products, like all sorts of external technology, are black boxes. They can inadvertently and unintentionally open a backdoor into the network.

Root access for superuser

Recogtech is putting an end to that black box situation by taking responsibility and giving the superuser root access to its biometric technology. This allows this superuser to configure our technology how they want it. Think of changing the IP addresses used for communication or installing an additional security layer. In short: complete control for IT management.

Security by design

Recogtech is convinced that this way of working is becoming the future. Phishing, being hacked, identity fraud, ransomware: every organisation faces this form of cybercrime. From an IT governance perspective, we are moving towards “Security by Design”.

*The global market size of biometric security products based on vein pattern recognition is expected to reach USD 1.15 billion by 2025. (Source: Business Insider)

Want to know more or looking for a biometric security solution for your organisation?

Latest

Biometric access control and privacy: what does the GDPR say?

The GDPR (General Data Protection Regulation) has been in force since 2018, and this has not gone unnoticed. Many organisations still struggle with its interpretation. In our own field, biometric access control, the GDPR also has the necessary impact. The court ruled...

FAR and FRR: security level versus ease of use

FAR and FRR. Anyone looking to assess or compare the performance of biometric security systems cannot avoid these terms. In this article, we explain what FAR and FRR mean, how they affect each other and their implications for security level and ease of use. Let us...

5 common biometric techniques compared

The best-known forms of biometric security are the fingerprint and iris scan. In addition, facial recognition and vein pattern recognition (of both finger and palm) are also on the rise. In this article, we list the pros and cons of all these forms. 1. Fingerprint...

How does vein pattern recognition work

There are three forms of vein pattern recognition. Palm vein pattern recognition, finger vein pattern recognition (both of which work using so-called near infrared* light) and retina vein pattern recognition. 1. Palm vein pattern recognition The haemoglobin in your...

The basics of biometrics

In order to compare biometric applications, it is useful to know something about the basics. In this article, we briefly outline the 'basics of biometrics' for you. 1. General definition of biometrics Biometric features are unique, person-specific characteristics that...